EP1041767A2 - Authentication of electronic data - Google Patents
Authentication of electronic data Download PDFInfo
- Publication number
- EP1041767A2 EP1041767A2 EP99307624A EP99307624A EP1041767A2 EP 1041767 A2 EP1041767 A2 EP 1041767A2 EP 99307624 A EP99307624 A EP 99307624A EP 99307624 A EP99307624 A EP 99307624A EP 1041767 A2 EP1041767 A2 EP 1041767A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- authenticator
- information
- data
- authenticators
- creating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
Definitions
- the present invention relates to an authentication system, an authentication method, a signing apparatus/method, a certifying apparatus/method, a software program and a recording medium for the same for creating an authenticator by applying a one-way function to electronic data, appending a signature to the electronic data and checking authentication of the electronic data using the authenticator.
- the invention more particularly relates to prevention of forgery of the authenticator.
- a station which transmits the electronic data divides the electronic data into specified blocks, subjects the data to a signature processing by applying a one-way function such as a hash function to each of the divided data blocks, and transmits the data obtained through the processing to a distant station (certifying station). While a station which receives the electronic data creates an authenticator by applying a one-way function to a portion of the data other than the authenticator in the received electronic data, compares the created authenticator with the authenticator included in the electronic data, and verifies whether the electronic data has been forged or not.
- a conventional type of hash function is formed not based on an organized structural method but based on, in many cases, an empirical or an intuitive method obtained by combining a logical operation such as AND and OR with four rule of arithmetic in a complex manner. Therefore, enormous man power is required for experiments or the like when the block length of the hash function is to be increased.
- aspects of the present invention may provide, in view of the problem described above, an authentication system, an authentication method, a signing apparatus, a signing method, a certifying apparatus/method, a software program and a recording medium for the same which can efficiently prevent the forgery of the authenticator, when checking the authentication of the electronic data from an authenticator created using a one-way function.
- a signing station creates a plurality of authenticators using a plurality of one-way functions then and links these plurality of authenticators to the electronic data, so that the length of the authenticators to be appended to the information can easily be made longer, which makes it possible to reduce a probability of misidentification of a forged authenticator.
- the whole authenticator is not linked to the information, but only a portion of data obtained by truncating each of the authenticator is linked, which makes it more difficult for a third party to forge the authenticator.
- a one-way operation is performed with the data using a different key, so that the length of the authenticators to be appended to the information can be made longer without utilizing a special one-way operation.
- Authenticators can be discretely and independently prepared in parallel with each other, so that a plurality of authenticators can quickly be prepared.
- an authenticator is prepared by utilizing intermediate data generated when a previous authenticator is created, so that generation of the authenticator is made more complicated, which makes it still difficult for a third party to forge the authenticator.
- a signing station executes a step of preparing a plurality of authenticators by applying a different one-way function to each data, and a step of linking the created authenticators to the information, so that the length of the authenticators to be appended to the information can easily be made longer, which makes it possible to reduce a probability of misidentification of a forged authenticator.
- a program stored in a recording medium makes a signing station execute a step of creating a plurality of authenticators by applying a different one-way function to each data, and a step of linking the created authenticators to the information, so that the length of the authenticators to be appended to the information can easily be made longer, which makes it possible to reduce a probability of misidentification of the forged authenticator.
- Fig. 1 is a block diagram showing system configuration of the authentication system used in the embodiment of the present invention.
- a signature side (a signing station) which creates an authenticator by applying a hash function to the text data and links this authenticator to the text data before transmission.
- an authentication side (a certifying station) which creates an authenticator by applying a hash function to the data obtained by removing the authenticator from the received data, comparing the created authenticator with the authenticator included in the received data to check the correctness of the text data.
- a communication error will not occur in the process of transmission of data from the signing station to the certifying station. However, occurrence of error may be prevented by using an error-correction code or the like in some other cases.
- the signing station comprises a plurality of hash units 2 and keys 3, and a linking unit 5, and it is assumed that data 1 is input to this signing station.
- the data 1 is text data as an object for transmission to the certifying station and consists of a plurality of data D1 to Dn obtained by dividing the data into data blocks of a size corresponding to a data length for a hash function.
- This data 1 is text data which contains numerals, characters, or symbols included in a document shown in Fig. 5, and, for example, "The present invention" shown in Fig. 5 corresponds to data D1.
- the hash units 2 have one-way functions for converting the data D1 to Dn using keys K1 to Kn to authentication signs CS1 to CSn respectively, and they output the converted authentication signs CS1 to CSn to the linking unit 5. Although it is assumed that the hash units 2 perform processing corresponding to a known hash function in a protocol or the like for a method of verifying authentication signs based on the conventional technology, it is not always required that reverse conversion is ensured.
- the keys 3 are the secret keys used when the hash units 2 perform scrambling of one-way data compression, and authentication signs 4 are prepared by the hash units 2 according to the keys K1 to Kn.
- the linking unit 5 links the authenticators 4 created by the hash units 2 to data D1 to Dn that should originally be transmitted, and the linked authenticators 4 are appended, for example, to the end of the document as shown in Fig. 5.
- the certifying station comprises a separating unit 7, a plurality of hash units 2 and keys 3, and a comparing unit 8, and data received from the signing station is input to the certifying station.
- the separating unit 7 separates the data received from the signing station into data D1' to Dn' and the authentication signs 4.
- the data D1' to Dn' is inputted into the hash units 2, while the authenticators 4 are inputted into the comparing unit 8.
- the comparing unit 8 compares the authentication signs separated from the received data with the authenticators created from the data D1' to Dn'.
- the comparing unit 8 certifies that the data is authentic when the authenticators are coincident with each other, and certifies that the data is forged one when the authenticators are not coincident.
- the authentication system is so configured that a signing station prepares a plurality of authenticators CS1 to CSn using a plurality of hash units, so that a data length of authenticators can be made longer, which makes it difficult to forge the authenticator by a third party.
- authenticators are created with a different key for each of the data D1 to Dn into which the text data has been divided, which makes it extremely difficult for a third party to forge the authenticator, thus reliability of text data being enhanced.
- the certifying station creates authenticators CS1' to CSn' each with a different key for each of the data D1' to Dn' separated from received data, compares the created authenticators CS1' to CSn' with the authenticators CS1 to CSn which are separated from the received data, determines the text data as an authentic one when it is determined that all the authenticators are coincident with each other, on the other hand, determines the text data as a forged one when even one authenticator is not coincident.
- FIG. 2 is a block diagram showing more specific configuration (independent and multi-parallel configuration) of the authentication system shown in Fig. 1.
- authenticators CS1 to CSn are created concurrently as well as in parallel from each of the input data D1 to Dn by using a different key.
- Fig. 2A shows configuration of the authentication system
- input data D1 to Dn is data D1 to Dn into which the text data as an object for transmission is divided.
- the hash units 2 create the authenticators CS using the keys K. More specifically, each of the hash units 2 consists of an EOR 21, a one-way function 22 such as a hash function, and a truncator 23.
- the EOR 21 executes an operation of an exclusive OR, and operates herein an exclusive OR between the input data and a value obtained in the one-way function 22 in the previous time (an initial value IV is used for the first time).
- the one-way function (corresponds to a one-way function device) 22 creates an irreversible authenticator CS with the help of the one-way function from the data processed in the EOR 21 based on the key K.
- the truncator 23 truncates the authenticator CS prepared by the one-way function 22 and outputs the truncated authenticator.
- the authenticator created by the one-way function 22 is outputted as it is, data length of the authenticator is naturally increased.
- an increase in the data length of the authenticator CS does not increase the safety of data but merely increases the amount of data to be transmitted.
- the truncator 23 truncates a portion of the authenticator created by the one-way function 22 so that increase in a data length of the authenticator CS is made really useful. Even if the authenticator is truncated, a symbol space same as that in the case where the authenticator are transmitted without being truncated is formed, therefore, security of data is not possibly reduced. Further, the security surely increases due to the truncation, because a third party will not know where the authenticator is truncated.
- Output data (D1 to Dn, CS1 to CSn) is obtained, as shown in Fig. 5, by linking the created authenticators CS1 to CSn to input data D1 to Dn.
- Fig. 2B shows how the authenticator CS is generated, and a portion of the left of Fig. 2B shows especially how the authenticator CS1 is generated.
- the authenticator CS1 can be created by using the key 1 and initial value IV through the sequence of 1 ⁇ to 5 ⁇ described above.
- FIG. 2B The central and the right portions of Fig. 2B respectively show, similarly to the sequence of 1 ⁇ to 5 ⁇ in the left portion, sequence of computing the authenticators CS2 and CS3 respectively. By repeating the same operation, authenticators up to CSn can also be computed.
- a forgery probability per CSn is 1/2 np (where p is a bit length of the authentication sign). This forgery probability can be reduced by increasing a number of authenticators CS. Even if a number of authenticators CS is increased, because the processing is in parallel, a time required for the processing does not change.
- Fig. 3A is a view showing a case where the authentication system shown in Fig. 1 operates independently in three parallel branches.
- Fig. 3A shows configuration of a case where n in Fig. 2A is set to 3.
- the same reference numerals as those in Fig. 2A are assigned to the hash units 2, the EOR21, the one-way function 22, and the truncator 23, and detailed description thereof is omitted herein.
- Fig. 3B shows how the authenticators CS1 to CS3 are generated in the hash units 2. Especially, the left portion of Fig. 3B shows a sequence of processing when the authenticator CS1 is created from the input data D1 to D3, the key K1, and initial value IV shown in Fig. 3A.
- Fig. 3B The central portion and the right portion of Fig. 3B respectively show, similarly to the sequence of 1 ⁇ ' to 5 ⁇ ' in left portion, sequence of computing authenticators CS2 and CS3.
- Fig. 4A shows configuration and Fig. 4B shows operation when hash units 2 perform parallel processing in association with each other. More specifically, these figures show a case in which n is set to 3 and intermediate data in a previous stage is used as an initial value in the next stage.
- Fig. 4A shows configuration of a case where n is set to 3 and intermediate data in a previous stage is used as the initial value in the next stage.
- the same reference numerals as those in Fig. 2A are assigned to the hash units 2, the EOR 21, the one-way function 22, and the truncator 23, and detailed description thereof is omitted herein.
- This case is different from the case shown in Fig. 3A in that the initial value IV is set according to the intermediate data generated in other hash unit 2.
- the hash units 2 are so configured that as the initial value IV, intermediate data generated in other hash unit 2 is substituted. This configuration allows the authenticator CS to become more complicated, therefore, security is highly enhanced.
- Fig. 4B shows how the authenticators CS1 to CS3 are generated in the hash units 2.
- the left portion of this figure shows a sequence of computing the authenticator CS1 in the hash unit 2 shown in the far left side of Fig. 4A.
- the authenticator CS1 is computed through the same sequence as that from 1 ⁇ ' to 5 ⁇ ' of the left portion in Fig. 3B, therefore, intermediate data generated in other hash unit 2 is not used.
- the central portion in Fig. 4B shows a sequence of computing the authenticator CS2 in the hash unit 2 second from the left side in Fig. 4A.
- the authenticator CS2 is computed by using an intermediate result (L12) shown by arrow 6 ⁇ obtained in the previous stage as the initial value through the same sequence as that from 1 ⁇ ' to 5 ⁇ ' shown in the left portion of Fig. 3B. Namely, in this second hash unit 2, the intermediate data obtained in the first hash unit 2 is used.
- the left portion of Fig. 4B shows a sequence of computing the authenticator CS3 in the hash unit 2 third from the left side in Fig. 4A.
- the authenticator CS3 is computed by using an intermediate result (L22) shown by arrow 7 ⁇ obtained in the previous stage as the initial value through the same sequence as that from 1 ⁇ ' to 5 ⁇ ' shown in the left portion of Fig. 3B.
- the intermediate data obtained in the second hash unit 2 is used.
- the hash units 2 are configured so as not to independently compute the authenticators CS1 to CS3 but to compute them in association with each other. This configuration allows a sequence of creation of the authenticators CS1 to CS3 to become more complicated, therefore, it becomes more difficult for a third party to forge the text data.
- Fig. 6A and Fig. 6B are conceptual views for explaining safety of the authentication system used in this embodiment.
- Fig. 6A shows the concept of the present invention while Fig. 6B shows the concept of the conventional technology.
- a text space M is a virtual space possibly occupied by the text as an object to be forged
- the authenticator space is a virtual space possibly occupied by the authenticator.
- the block length of the authenticator depends on the processing block length of a hash function, the block length of the authenticator cannot be easily made longer.
- a forged space is made smaller by making use of a plurality of keys, so that the probability that the forged authenticator is by mistake recognized as the genuine authenticator is reduced. More specifically, assuming in Fig.
- the space for forgery is a space for forgery M123 which is extremely small and it is the area commonly shared by the spaces for forgery M1, M2, and M3, thus a probability that the data can be forged becomes still smaller.
- the signing station creates a plurality of authenticators using a plurality of one-way functions and then links these plurality of authenticators to the electronic data, while the certifying station compares the authenticators created from the electronic data which is separated from the received data with the authenticators included in this received data, and verifies whether the electronic data is a forged one or not. Therefore, with the present invention, even when the electronic data is a forged one, the probability of misidentification that the forged data may be erroneously recognized as an authentic data can greatly and easily be reduced, further, the probability of misidentification can be reduced through parallel processing without increasing the time required for preparing authenticators.
- the probability of misidentification of a forged authenticator can further be reduced without increasing the amount of data required for the authenticator to be appended to the electronic data.
- intermediate data obtained when the authenticator is created in a previous stage is used as the initial value in the next stage, which allows the probability of misidentification to further be reduced.
- the object for processing is text data in a document.
- the present invention is not limited to the above case, but is also applicable to various types of multimedia data such as image data, video data, or audio data.
- a hash function is used as a one-way function
- the present invention is not limited to the above case, and any one-way function other that the hash function may be used.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Description
- The present invention relates to an authentication system, an authentication method, a signing apparatus/method, a certifying apparatus/method, a software program and a recording medium for the same for creating an authenticator by applying a one-way function to electronic data, appending a signature to the electronic data and checking authentication of the electronic data using the authenticator. The invention more particularly relates to prevention of forgery of the authenticator.
- In association with recent development in the computer technology, there has increased an opportunity to accumulate electronic data such as a document prepared with characters, numerals, and strings of symbols in a database, or to transfer the data via a network. Considering these facts, how to avoid forgery of electronic data accumulated in a database or forgery of data during data communications has become a serious problem.
- For solving the problem, there has been known an authentication technology in which an authenticator created by applying a one-way function to electronic data is appended thereto when the electronic data is transmitted and whether transmitted data is forged or not is verified using this authenticator when the electronic data is received.
- More specifically, a station which transmits the electronic data (signing station) divides the electronic data into specified blocks, subjects the data to a signature processing by applying a one-way function such as a hash function to each of the divided data blocks, and transmits the data obtained through the processing to a distant station (certifying station). While a station which receives the electronic data creates an authenticator by applying a one-way function to a portion of the data other than the authenticator in the received electronic data, compares the created authenticator with the authenticator included in the electronic data, and verifies whether the electronic data has been forged or not.
- However, even if the conventional technology described above is used, forgery of or tampering of electronic data can not possibly be verified if the portion of the authenticator itself is forged, namely if the signature is forged. Therefore, prevention of forgery of the signature becomes an issue that need to be resolved.
- When a hash function is used, for example, it is possible to make more difficult to forgery of electronic data by making longer a processed block length of the hash function. However, it is not realistic to make the processed block length of the hash function extraordinarily long.
- Especially, a conventional type of hash function is formed not based on an organized structural method but based on, in many cases, an empirical or an intuitive method obtained by combining a logical operation such as AND and OR with four rule of arithmetic in a complex manner. Therefore, enormous man power is required for experiments or the like when the block length of the hash function is to be increased.
- Aspects of the present invention may provide, in view of the problem described above, an authentication system, an authentication method, a signing apparatus, a signing method, a certifying apparatus/method, a software program and a recording medium for the same which can efficiently prevent the forgery of the authenticator, when checking the authentication of the electronic data from an authenticator created using a one-way function.
- In one aspect of the invention, a signing station creates a plurality of authenticators using a plurality of one-way functions then and links these plurality of authenticators to the electronic data, so that the length of the authenticators to be appended to the information can easily be made longer, which makes it possible to reduce a probability of misidentification of a forged authenticator.
- The whole authenticator is not linked to the information, but only a portion of data obtained by truncating each of the authenticator is linked, which makes it more difficult for a third party to forge the authenticator.
- A one-way operation is performed with the data using a different key, so that the length of the authenticators to be appended to the information can be made longer without utilizing a special one-way operation.
- Authenticators can be discretely and independently prepared in parallel with each other, so that a plurality of authenticators can quickly be prepared.
- Alternatively, an authenticator is prepared by utilizing intermediate data generated when a previous authenticator is created, so that generation of the authenticator is made more complicated, which makes it still difficult for a third party to forge the authenticator.
- A signing station executes a step of preparing a plurality of authenticators by applying a different one-way function to each data, and a step of linking the created authenticators to the information, so that the length of the authenticators to be appended to the information can easily be made longer, which makes it possible to reduce a probability of misidentification of a forged authenticator.
- In a method of the invention, there is a step of not linking the created whole authenticators to the information but linking only a portion of the data obtained by truncating each of the authenticators, which makes it more difficult for a third party to forge the authenticators.
- Also, there is a step of performing a one-way operation with the data using a different key, so that the length of the authenticators to be appended to the information can be made longer without utilizing a special one-way operation.
- Optionally, there are steps of discretely and independently creating the authenticators in parallel with each other, so that a plurality of authenticators can quickly be created.
- As an alternative, there is a step of preparing the authenticator by utilizing an intermediate data generated when another authenticator is created, so that creation of the authenticator is made more complicated, which makes it still difficult for a third party to forge the authenticator.
- In another aspect of the invention, a program stored in a recording medium makes a signing station execute a step of creating a plurality of authenticators by applying a different one-way function to each data, and a step of linking the created authenticators to the information, so that the length of the authenticators to be appended to the information can easily be made longer, which makes it possible to reduce a probability of misidentification of the forged authenticator.
- Reference is made, by way of example, to the accompanying drawings in which:
- Fig. 1 shows a system configuration of the authentication system used in an embodiment of the present invention;
- Fig. 2A and Fig. 2B show more specific configurations (independent and multi-parallel configuration) of the authentication system shown in Fig. 1;
- Fig. 3A and Fig. 3B show a case where the authentication system shown in Fig. 1 operates independently in three parallel branches;
- Fig. 4A shows configuration and Fig. 4B shows operation
when the
hash units 2 perform parallel processing in association with each other; - Fig. 5 is a view showing one example of a document as an object for processing; and
- Fig. 6A and Fig. 6B explain the safety in the authentication system used in the embodiment.
-
- Detailed description is made hereinafter of a preferred embodiment of the present invention with reference to Fig. 1 to Fig. 6. It should be noted that this embodiment explains a case in which text data included in a document is the target data and an authenticator is created by applying a hash function to this target data.
- Fig. 1 is a block diagram showing system configuration of the authentication system used in the embodiment of the present invention. In the left-hand side of Fig. 1 is a signature side (a signing station) which creates an authenticator by applying a hash function to the text data and links this authenticator to the text data before transmission. In the right-hand side of Fig. 1 is an authentication side (a certifying station) which creates an authenticator by applying a hash function to the data obtained by removing the authenticator from the received data, comparing the created authenticator with the authenticator included in the received data to check the correctness of the text data. Although it is assumed in this embodiment that a communication error will not occur in the process of transmission of data from the signing station to the certifying station. However, occurrence of error may be prevented by using an error-correction code or the like in some other cases.
- At first, configuration of the signing station is described. As shown in Fig. 1, the signing station comprises a plurality of
hash units 2 andkeys 3, and a linkingunit 5, and it is assumed thatdata 1 is input to this signing station. - The
data 1 is text data as an object for transmission to the certifying station and consists of a plurality of data D1 to Dn obtained by dividing the data into data blocks of a size corresponding to a data length for a hash function. Thisdata 1 is text data which contains numerals, characters, or symbols included in a document shown in Fig. 5, and, for example, "The present invention" shown in Fig. 5 corresponds to data D1. - The
hash units 2 have one-way functions for converting the data D1 to Dn using keys K1 to Kn to authentication signs CS1 to CSn respectively, and they output the converted authentication signs CS1 to CSn to the linkingunit 5. Although it is assumed that thehash units 2 perform processing corresponding to a known hash function in a protocol or the like for a method of verifying authentication signs based on the conventional technology, it is not always required that reverse conversion is ensured. - The
keys 3 are the secret keys used when thehash units 2 perform scrambling of one-way data compression, andauthentication signs 4 are prepared by thehash units 2 according to the keys K1 to Kn. - The linking
unit 5 links theauthenticators 4 created by thehash units 2 to data D1 to Dn that should originally be transmitted, and the linkedauthenticators 4 are appended, for example, to the end of the document as shown in Fig. 5. - Next, configuration of the certifying station is described. As shown in Fig. 1, the certifying station comprises a separating
unit 7, a plurality ofhash units 2 andkeys 3, and a comparingunit 8, and data received from the signing station is input to the certifying station. - The separating
unit 7 separates the data received from the signing station into data D1' to Dn' and theauthentication signs 4. The data D1' to Dn' is inputted into thehash units 2, while theauthenticators 4 are inputted into the comparingunit 8. - The comparing
unit 8 compares the authentication signs separated from the received data with the authenticators created from the data D1' to Dn'. The comparingunit 8 certifies that the data is authentic when the authenticators are coincident with each other, and certifies that the data is forged one when the authenticators are not coincident. - As described above, the authentication system according to this embodiment is so configured that a signing station prepares a plurality of authenticators CS1 to CSn using a plurality of hash units, so that a data length of authenticators can be made longer, which makes it difficult to forge the authenticator by a third party.
- A sequence of processing by the signing station and the certifying station of the authentication system shown in Fig. 1 is described below.
-
- (1-1) The
hash units 2 create CS1 to CSn each as theauthenticators 4 by performing the processing of a one-way function using a key for each of input data D1 to Dn respectively into which the text data has been divided. - (1-2) The linking
unit 5 links the authenticators CS1 to CSn created by thehash units 2 to the data D1 to Dn. As a result, for example, authenticators of 8 digits each consisting of 4 bits are appended, for example, to the end of the text as shown in the document of Fig. 5. -
- As described above, authenticators are created with a different key for each of the data D1 to Dn into which the text data has been divided, which makes it extremely difficult for a third party to forge the authenticator, thus reliability of text data being enhanced.
-
- (2-1) The document shown in Fig. 5 prepared in the above step (1) is separated into the authenticators CS1 to Cn and data D1' to Dn' (data blocks).
- (2-2) The
hash units 2 create CS1' to CSn' as theauthenticators 4 for the separated data D1' to Dn' respectively by using a different key. - (2-3) The created authenticators CS1' to CSn' are compared with the separated authenticators CS1 to CSn, and whether the authenticators are coincident with each other or not is determined. When the authenticators are coincident, then the text data is recognized as not being forged, namely as an authentic one. On the other hand, when even a single authenticator is not coincident, then the text data is recognized as being a forged one.
-
- As described above, the certifying station creates authenticators CS1' to CSn' each with a different key for each of the data D1' to Dn' separated from received data, compares the created authenticators CS1' to CSn' with the authenticators CS1 to CSn which are separated from the received data, determines the text data as an authentic one when it is determined that all the authenticators are coincident with each other, on the other hand, determines the text data as a forged one when even one authenticator is not coincident.
- More specific configuration (independent and multi-parallel configuration) of the authentication system shown in Fig. 1 is described. Fig. 2 is a block diagram showing more specific configuration (independent and multi-parallel configuration) of the authentication system shown in Fig. 1. Herein a case is assumed in which authenticators CS1 to CSn are created concurrently as well as in parallel from each of the input data D1 to Dn by using a different key.
- Fig. 2A shows configuration of the authentication system, and in Fig. 2A, input data D1 to Dn is data D1 to Dn into which the text data as an object for transmission is divided. The
hash units 2 create the authenticators CS using the keys K. More specifically, each of thehash units 2 consists of anEOR 21, a one-way function 22 such as a hash function, and atruncator 23. - The
EOR 21 executes an operation of an exclusive OR, and operates herein an exclusive OR between the input data and a value obtained in the one-way function 22 in the previous time (an initial value IV is used for the first time). - The one-way function (corresponds to a one-way function device) 22 creates an irreversible authenticator CS with the help of the one-way function from the data processed in the
EOR 21 based on the key K. - The
truncator 23 truncates the authenticator CS prepared by the one-way function 22 and outputs the truncated authenticator. When the authenticator created by the one-way function 22 is outputted as it is, data length of the authenticator is naturally increased. However, an increase in the data length of the authenticator CS does not increase the safety of data but merely increases the amount of data to be transmitted. - Therefore, the
truncator 23 truncates a portion of the authenticator created by the one-way function 22 so that increase in a data length of the authenticator CS is made really useful. Even if the authenticator is truncated, a symbol space same as that in the case where the authenticator are transmitted without being truncated is formed, therefore, security of data is not possibly reduced. Further, the security surely increases due to the truncation, because a third party will not know where the authenticator is truncated. - Output data (D1 to Dn, CS1 to CSn) is obtained, as shown in Fig. 5, by linking the created authenticators CS1 to CSn to input data D1 to Dn.
- Fig. 2B shows how the authenticator CS is generated, and a portion of the left of Fig. 2B shows especially how the authenticator CS1 is generated.
- In the left portion in Fig. 2B,
- 1 ○ "IV = Public constant" indicates that a public constant
is set as the initial value IV which is inputted into the
EOR 21 forming a part of thehash unit 2 in the far left side of Fig. 2A. - 2 ○ "EK1[IV(+)D1]=L11" indicates that the
EOR 21 in Fig. 2A operates an exclusive OR between the initial value IV set in 1 ○ and the input data D1, and that the one-way function 22 performs a one-way operation (e.g., an operation by a hash function) with respect to the value obtained by operating the exclusive OR using the key K1 to obtain a value L11. - 3 ○ "EK1[L11(+)D2]=L12" indicates that the
EOR 21 in Fig. 2A operates an exclusive OR between the value L11 obtained in 2 ○ and the second input data D2, and that the one-way function 22 performs a one-way operation (e.g., an operation by a hash function) with respect to the value obtained by operating the exclusive OR using the key K1 to obtain a value L12. - 4 ○ "EK1[L1(n-1)(+)Dn]=L1n" indicates that the
EOR 21 in Fig. 2A operates, similarly as described above, an exclusive OR between the previously obtained value L1 (n-1) and n-th data Dn, and that the one-way function 22 performs a one-way operation (e.g., an operation by a hash function) with respect to the value obtained by operating the exclusive OR using the key K1 to obtain a value L1n. - 5 ○ "Tr[L1n]=CS1" indicates that, when the operation is performed with respect to the last i.e. the n-th data Dn, a result of the last operation is outputted as the authenticator CS1.
-
- Thus, the authenticator CS1 can be created by using the
key 1 and initial value IV through the sequence of 1 ○ to 5 ○ described above. - The central and the right portions of Fig. 2B respectively show, similarly to the sequence of 1 ○ to 5 ○ in the left portion, sequence of computing the authenticators CS2 and CS3 respectively. By repeating the same operation, authenticators up to CSn can also be computed.
- As described above, it is possible to concurrently compute authentication signs CS1 to CSn by using the keys K1 to Kn independently in n parallel branches. Herein, a forgery probability per CSn is 1/2np (where p is a bit length of the authentication sign). This forgery probability can be reduced by increasing a number of authenticators CS. Even if a number of authenticators CS is increased, because the processing is in parallel, a time required for the processing does not change.
- Next, a configuration as well as an operation is described when n=3 (independent triple-parallel configuration) in Fig. 2A and Fig. 2B with reference to Fig. 3A and Fig. 3B. Fig. 3A is a view showing a case where the authentication system shown in Fig. 1 operates independently in three parallel branches.
- Fig. 3A shows configuration of a case where n in Fig. 2A is set to 3. The same reference numerals as those in Fig. 2A are assigned to the
hash units 2, the EOR21, the one-way function 22, and thetruncator 23, and detailed description thereof is omitted herein. - Fig. 3B shows how the authenticators CS1 to CS3 are generated in the
hash units 2. Especially, the left portion of Fig. 3B shows a sequence of processing when the authenticator CS1 is created from the input data D1 to D3, the key K1, and initial value IV shown in Fig. 3A. - In the left portion in Fig. 3B,
- 1 ○' "IV = Public constant" indicates that a public constant
is set as the initial value IV which is inputted into the
EOR 21 in thefirst hash unit 2 from the left side of Fig. 3A. - 2 ○' "EK1[IV(+)D1]=L11" indicates that the
EOR 21 in Fig. 3A operates an exclusive OR between the initial value IV set in 1 ○' and the first input data D1, and that the one-way function 22 performs a one-way operation (e.g., an operation by a hash function) with respect to the value obtained by operating the exclusive OR using the key K1 to obtain a value L11. - 3 ○' "EK1[L11(+)D2]=L12" indicates that the
EOR 21 in Fig. 3A operates an exclusive OR between the value L11 obtained in 2 ○' and the second input data D2, and that the one-way function 22 performs a one-way operation (e.g., an operation by a hash function) with respect to the value obtained by operating the exclusive OR using the key K1 to obtain a value L12. - 4 ○' "EK1[L12(+)D3]=L13" indicates that the
EOR 21 in Fig. 3A operates, similarly as described above, an exclusive OR between the previously obtained value L12 and 3rd data D3, and that the one-way function 22 performs a one-way operation (e.g., an operation by a hash function) with respect to the value obtained by operating the exclusive OR using the key K1 to obtain a value L1n. - 5 ○' "Tr[L13]=CS1" indicates that, when the operation is performed with respect to the last i.e. 3rd data D3, a result of the 3rd operation is outputted as the authenticator CS1.
-
- The central portion and the right portion of Fig. 3B respectively show, similarly to the sequence of 1 ○' to 5 ○' in left portion, sequence of computing authenticators CS2 and CS3.
- Through the above mentioned sequence of 1 ○' to 5 ○', it is possible to concurrently and independently compute authenticators CS1 to CS3 by using the keys K1 to K3 respectively.
- A case has been explained above in which the
hash units 2 perform parallel processing in three branches concurrently and independently. However, the present invention is not limited to this and it may be applied to a case in which thehash units 2 perform parallel processing in association with each other and not concurrently. - The case in which the
hash units 2 perform parallel processing in association with each other is explained here. Fig. 4A shows configuration and Fig. 4B shows operation whenhash units 2 perform parallel processing in association with each other. More specifically, these figures show a case in which n is set to 3 and intermediate data in a previous stage is used as an initial value in the next stage. - Fig. 4A shows configuration of a case where n is set to 3 and intermediate data in a previous stage is used as the initial value in the next stage. The same reference numerals as those in Fig. 2A are assigned to the
hash units 2, theEOR 21, the one-way function 22, and thetruncator 23, and detailed description thereof is omitted herein. - This case is different from the case shown in Fig. 3A in that the initial value IV is set according to the intermediate data generated in
other hash unit 2. Thehash units 2 are so configured that as the initial value IV, intermediate data generated inother hash unit 2 is substituted. This configuration allows the authenticator CS to become more complicated, therefore, security is highly enhanced. - Fig. 4B shows how the authenticators CS1 to CS3 are generated in the
hash units 2. Especially, the left portion of this figure shows a sequence of computing the authenticator CS1 in thehash unit 2 shown in the far left side of Fig. 4A. It should be noted that, the authenticator CS1 is computed through the same sequence as that from 1 ○' to 5 ○' of the left portion in Fig. 3B, therefore, intermediate data generated inother hash unit 2 is not used. - The central portion in Fig. 4B shows a sequence of computing the authenticator CS2 in the
hash unit 2 second from the left side in Fig. 4A. Herein, the authenticator CS2 is computed by using an intermediate result (L12) shown by arrow 6 ○ obtained in the previous stage as the initial value through the same sequence as that from 1 ○' to 5 ○' shown in the left portion of Fig. 3B. Namely, in thissecond hash unit 2, the intermediate data obtained in thefirst hash unit 2 is used. - The left portion of Fig. 4B shows a sequence of computing the authenticator CS3 in the
hash unit 2 third from the left side in Fig. 4A. Herein, the authenticator CS3 is computed by using an intermediate result (L22) shown byarrow 7 ○ obtained in the previous stage as the initial value through the same sequence as that from 1 ○' to 5 ○' shown in the left portion of Fig. 3B. Namely, in thisthird hash unit 2, the intermediate data obtained in thesecond hash unit 2 is used. - Through the above mentioned sequence, the
hash units 2 are configured so as not to independently compute the authenticators CS1 to CS3 but to compute them in association with each other. This configuration allows a sequence of creation of the authenticators CS1 to CS3 to become more complicated, therefore, it becomes more difficult for a third party to forge the text data. - Fig. 6A and Fig. 6B are conceptual views for explaining safety of the authentication system used in this embodiment. Fig. 6A shows the concept of the present invention while Fig. 6B shows the concept of the conventional technology.
- In Fig. 6B, a text space M is a virtual space possibly occupied by the text as an object to be forged, and the authenticator space is a virtual space possibly occupied by the authenticator. When the text space M corresponds to the authenticator space one to one, it becomes necessary to increase the block length of the authenticator in order to make smaller a forged text space M2 on the text space M in the manner shown with the circle indicated by a dotted line to the circle indicated by a solid line, so that a probability that the forged authenticator is by mistake recognized as the genuine authenticator is reduced.
- However, as the block length of the authenticator depends on the processing block length of a hash function, the block length of the authenticator cannot be easily made longer.
- Therefore, in the present invention, as shown in Fig. 6A, a forged space is made smaller by making use of a plurality of keys, so that the probability that the forged authenticator is by mistake recognized as the genuine authenticator is reduced. More specifically, assuming in Fig. 6A that a forged-text space on the text space M when the key K1 is used is M1, that a forged text space on the text space M when the key K2 is used is M2, and that a forged text space on the text space M when the key K3 is used is M3, and when the keys K1, K2, and K3 according to the present invention are used, the space for forgery is a space for forgery M123 which is extremely small and it is the area commonly shared by the spaces for forgery M1, M2, and M3, thus a probability that the data can be forged becomes still smaller.
- As described above, in the present invention, the signing station creates a plurality of authenticators using a plurality of one-way functions and then links these plurality of authenticators to the electronic data, while the certifying station compares the authenticators created from the electronic data which is separated from the received data with the authenticators included in this received data, and verifies whether the electronic data is a forged one or not. Therefore, with the present invention, even when the electronic data is a forged one, the probability of misidentification that the forged data may be erroneously recognized as an authentic data can greatly and easily be reduced, further, the probability of misidentification can be reduced through parallel processing without increasing the time required for preparing authenticators.
- Furthermore, if the authenticator is truncated using a truncator, the probability of misidentification of a forged authenticator can further be reduced without increasing the amount of data required for the authenticator to be appended to the electronic data. In addition, intermediate data obtained when the authenticator is created in a previous stage is used as the initial value in the next stage, which allows the probability of misidentification to further be reduced.
- The above description assumes that the object for processing is text data in a document. However, the present invention is not limited to the above case, but is also applicable to various types of multimedia data such as image data, video data, or audio data. In addition, although it has been described above that a hash function is used as a one-way function, the present invention is not limited to the above case, and any one-way function other that the hash function may be used.
- Although the invention has been described with respect to a specific embodiment for a complete and clear disclosure, the appended claims are not to be thus limited but are to be construed as embodying all modifications and alternative constructions that may occur to one skilled in the art which fairly fall within the basic teaching herein set forth.
Claims (24)
- An authentication system comprising:a signing station which creates an authenticator by applying a one-way function to information and then appends a signature generated from the authenticator to the information:a certifying station for checking the authentication of the information from the authenticator included in the data received from said signing station;a first authenticator creating unit or dividing the information into a plurality of data each having a prespecified length, and creating a plurality of authenticators by applying a different one-way function to each of the data; anda linking unit for linking the plurality of authenticators created in said first authenticator creating unit to the information;a separating unit for separating the information and the plurality of authenticators from the data received from said signing station;a second authenticator creating unit for dividing the information separated by said separating unit into a plurality of data each having a prespecified length, and creating a plurality of authenticators by applying a different one-way function to each of the data; anda certifying unit for comparing the plurality of authenticators created by said second authenticator creating unit with the plurality of authenticators separated from the information by said separating unit, and checking the authentication of the information.
- An authentication system according to Claim 1; wherein said linking unit links the authenticators obtained by truncating the authenticators created by said first authenticator creating unit to the information, and
said certifying unit compares the authenticators obtained by truncating the authenticators created by said second authenticator creating unit to-the authenticators separated from the information by said separating unit and checking the authentication of the information. - An authentication system according to Claim 2; wherein said first authenticator creating unit and said second authenticator creating unit create a first authenticator by subjecting first data to a one-way operation using a first key, and prepare a second authenticator by subjecting second data to a one-way operation using a second key.
- An authentication system according to Claim 3; wherein each of said first authenticator creating unit and said second authenticator creating unit discretely and independently creates the first authenticator and the second authenticator in parallel with each other.
- An authentication system according to Claim 3; wherein each of said first authenticator creating unit and said second authenticator creating unit utilize intermediate data when creating the second authenticator, which intermediate data is generated when the first authenticator is created.
- An authentication method applied in an authentication system, wherein said authentication system has a signing station which creates an authenticator by applying a one-way function to information and then appends a signature generated from the authenticator to the information, and a certifying station for checking the authentication of the information from the authenticator included in the data received from said signing station; whereinsaid signing station executes,a first authenticator creating step of dividing the information into a plurality of data each having a prespecified length, and creating a plurality of authenticators by applying a different one-way function to each of the data; anda transmitting step of linking the plurality of authenticators created in said first authenticator creating step to the information and transmitting the information to the certifying station; andsaid certifying station executes,a separating step of separating the information and the plurality of authenticators from the data received from said signing station;a second authenticator creating step of dividing the information separated in said separating step into a plurality of data each having a prespecified length, and creating a plurality of authenticators by applying a different one-way function to each of the data; anda certifying step of comparing the plurality of authenticators created in said second authenticator creating step with the plurality of authenticators separated from the information in said separating step, and checking the authentication of the information.
- An authentication method according to Claim 6; wherein said transmitting step comprises a step of linking the authenticators obtained by truncating the authenticators created in said first authenticator creating step to the information, and
said certifying step comprises a step of comparing the authenticator obtained by truncating the authenticators created in said second authenticator creating step to the authenticators separated from the information in said separating step and a step of checking the authentication of the information. - An authentication method according to Claim 7; wherein said first authenticator creating step and said second authenticator creating step comprise a step of creating a first authenticator by subjecting first data to a one-way operation using a first key, and a step of creating a second authenticator by subjecting second data to a one-way operation using a second key.
- An authentication method according to Claim 8; wherein each of said first authenticator creating step and said second authenticator creating step comprise a step of discretely and independently creating the first authenticator and the second authenticator in parallel with each other.
- An authentication system according to Claim 8; wherein each of said first authenticator creating step and said second authenticator creating step comprise a step of utilizing intermediate data when creating the second authenticator, which intermediate data is generated when the first authenticator is created.
- A software program for making a computer execute an authentication method applied in an authentication system, wherein said authentication system has a signing station which creates an authenticator by applying a one-way function to information and then appends a signature generated from the authenticator to the information, and a certifying station for checking the authentication of the information from the authenticator included in the data received from said signing station; whereinthe program makes said signing station execute,a first authenticator creating step of dividing the information into a plurality of data each having a prespecified length, and creating a plurality of authenticators by applying a different one-way function to each of the data; anda transmitting step of linking the plurality of authenticators created in said first authenticator creating step to the information and transmitting the information to the certifying station; andthe program makes said certifying station execute,a separating step of separating the information and the plurality of authenticators from the data received from said signing station;a second authenticator creating step of dividing the information separated in said separating step into a plurality of data each having a prespecified length, and creating a plurality of authenticators by applying a different one-way function to each of the data; anda certifying step of comparing the plurality of authenticators created in said second authenticator creating step with the plurality of authenticators separated from the information in said separating step, and checking the authentication of the information.
- A signing apparatus which creates an authenticator by utilizing a key and applying a one-way function to information and then appends a signature to the information; said apparatus comprising:a dividing unit for dividing the information into a plurality of data;an authenticator creating unit for creating an authenticator by utilizing a key and applying a one-way function corresponding to each of the divided data; anda linking unit for linking the plurality of created authenticators to the information.
- A signing apparatus which creates an authenticator by utilizing a key and applying a one-way function to information and then appends a signature to the information; said apparatus comprising:a dividing unit for dividing the information into a plurality of data;an authenticator creating unit for repeating the creation of an authenticator by utilizing a key and applying a one-way function to one of the divided data as well as creation of an authenticator by utilizing a key and applying a one-way function to desired intermediate data for which the one-way function has already been applied as the next data; anda linking unit for linking the plurality of created authenticators to the information.
- A certifying apparatus which creates an authenticator by utilizing a key and applying a one-way function to information and then appends a signature to the information as well as checking the authentication of the information; said apparatus comprising:a separating unit for separating information and the plurality of authenticators from the data;a dividing unit for dividing the information into a plurality of data;an authenticator creating unit for creating authenticators by utilizing a key and applying a one-way function corresponding to each of the divided data; anda certifying unit for checking the authentication of the information based on each of the created authenticators and each of the separated authenticators.
- A certifying apparatus which creates an authenticator by utilizing a key and applying a one-way function to information and then appends a signature to the information as well as checking the authentication of the information; said apparatus comprising:a separating unit for separating information and the plurality of authenticators from the data;a dividing unit for dividing the information into a plurality of data;an authenticator creating unit for repeating the creation of an authenticator by utilizing a key and applying a one-way function to one of the divided data as well as creation of an authenticator by utilizing a key and applying a one-way function to desired intermediate data for which the one-way function has already been applied,as the next data; anda certifying unit for checking the authentication of the information based on each of the created authenticators and each of the separated authenticators.
- A software program for making a computer execute:a dividing step of dividing information into a plurality of data;an authenticator creating step of creating an authenticator by utilizing a key and applying a one-way function corresponding to each of the divided data; anda linking step of linking the plurality of created authenticators to the information.
- A software program for making a computer execute:a dividing step of dividing information into a plurality of data;an authenticator creating step of repeating the creation of an authenticator by utilizing a key and applying a one-way function to one of the divided data as well as creation of an authenticator by utilizing a key and applying a one-way function to a desired intermediate data the next data when the one-way function was applied; anda linking step of linking the plurality of created authenticators to the information.
- A software program for making a computer execute:a separating step of separating information and a plurality of authenticators from data;a dividing step of dividing the information into a plurality of data;an authenticator creating step of creating authenticators by utilizing a key and applying a one-way function corresponding to each of the divided data; anda certifying step of checking the authentication of the information based on each of the created authenticators and each of the separated authenticators.
- A software program for making a computer execute:a separating step of separating information and plurality of authenticators from data;a dividing step of dividing the information into a plurality of data;an authenticator creating step of repeating the creation of an authenticator by utilizing a key and applying a one-way function to one of the divided data as well as creation of an authenticator by utilizing a key and applying a one-way function to a desired intermediate data the next data when the one-way function was applied; anda certifying step of checking the authentication of the information based on each of the created authenticators and each of the separated authenticators.
- A signing method in which an authenticator is created by utilizing a key and applying a one-way function to information and then a signature is appended to the information; said method comprising:a dividing step of dividing information into a plurality of data;an authenticator creating step of creating authenticators by utilizing a key and applying a one-way function corresponding to each of the divided data; anda linking step of linking the plurality of created authenticators to the information.
- A signing method in which an authenticator is created by utilizing a key and applying a one-way function to information and then a signature is appended to the information; said method comprising:a dividing step of dividing information into a plurality of data;an authenticator creating step of repeating the creation of an authenticator by utilizing a key and applying a one-way function to one of the divided data as well as creation of an authenticator by utilizing a key and applying a one-way function to a desired intermediate data the next data when the one-way function was applied; anda linking step of linking the plurality of created authenticators to the information.
- A certifying method in which an authenticator is created by utilizing a key and applying a one-way function to information and then a signature is appended to the information as well as the authentication of the information is checked; said method comprising:a separating step of separating information and a plurality of authenticators from data;a dividing step of dividing the information into a plurality of data;an authenticator creating step of creating authenticators by utilizing a key and applying a one-way function corresponding to each of the divided data; anda certifying step of checking the authentication of the information based on each of the created authenticators and each of the separated authenticators.
- A certifying method in which an authenticator is created by utilizing a key and applying a one-way function to information and then a signature is appended to the information as well as the authentication of the information is checked; said method comprising:a separating step of separating information and plurality of authenticators from data;a dividing step of dividing the information into a plurality of data;an authenticator creating step of repeating the creation of an authenticator by utilizing a key and applying a one-way function to one of the divided data as well as creation of an authenticator by utilizing a key and applying a one-way function to desired intermediate data, for which the one-way function has been applied, as the next data; anda certifying step of checking the authentication of the information based on each of the created authenticators and each of the separated authenticators.
- A computer readable recording medium on which is recorded a software program according to any one of claims 11, 16, 17, 18 or 19.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP8823399 | 1999-03-30 | ||
JP11088233A JP2000286836A (en) | 1999-03-30 | 1999-03-30 | Certification device and recording medium |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1041767A2 true EP1041767A2 (en) | 2000-10-04 |
EP1041767A3 EP1041767A3 (en) | 2002-05-15 |
EP1041767B1 EP1041767B1 (en) | 2004-11-24 |
Family
ID=13937159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99307624A Expired - Lifetime EP1041767B1 (en) | 1999-03-30 | 1999-09-28 | Authentication of electronic data |
Country Status (4)
Country | Link |
---|---|
US (1) | US7512801B1 (en) |
EP (1) | EP1041767B1 (en) |
JP (1) | JP2000286836A (en) |
DE (1) | DE69922157T2 (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002025866A2 (en) * | 2000-09-18 | 2002-03-28 | At & T Corp. | Apparatus, system and method for validating integrity of transmitted data |
WO2002101971A2 (en) * | 2001-06-12 | 2002-12-19 | At & T Wireless Services, Inc. | Apparatus, system and method for validating integrity of transmitted data |
GB2381700A (en) * | 2001-11-01 | 2003-05-07 | Vodafone Plc | Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions |
WO2003055135A2 (en) * | 2001-12-21 | 2003-07-03 | Koninklijke Philips Electronics N.V. | Synchronizing source and destination systems via parallel hash value determinations |
EP1526700A2 (en) * | 2002-12-05 | 2005-04-27 | Microsoft Corporation | Secure recovery in a serverless distributed file system |
EP1594252A2 (en) * | 2004-05-04 | 2005-11-09 | Elsevier, Inc. | Systems and methods for data compression and decompression |
WO2006001996A1 (en) * | 2004-06-15 | 2006-01-05 | Hewlett-Packard Development Company, L.P. | Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content |
US7177845B2 (en) | 1999-11-29 | 2007-02-13 | Microsoft Corporation | Copy detection for digitally-formatted works |
EP1752906A2 (en) | 2005-07-25 | 2007-02-14 | Canon Kabushiki Kaisha | Information processing apparatus and method |
US7194440B2 (en) * | 2000-09-29 | 2007-03-20 | Deutsche Telekom Ag | Billing method using SSL/TLS |
US7231372B1 (en) * | 1998-09-22 | 2007-06-12 | Siemens Aktiengesellschaft | Method and system for paying for goods or services |
US7240033B2 (en) * | 2000-03-14 | 2007-07-03 | Sony Corporation | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system |
US7240034B1 (en) * | 1999-10-26 | 2007-07-03 | France Telecom | Method for secure electronic transaction and corresponding system |
US7251635B2 (en) * | 2002-02-25 | 2007-07-31 | Schlumberger Omnes, Inc. | Method and apparatus for managing a key management system |
US7257557B2 (en) * | 2003-07-22 | 2007-08-14 | Online Testing Services, Inc. | Multi-modal testing methodology |
US7277871B2 (en) * | 2002-03-11 | 2007-10-02 | Matsushita Electric Industrial Co., Ltd. | Digital watermark system |
US7280983B2 (en) * | 2002-09-02 | 2007-10-09 | Pioneer Corporation | Information recording medium having reproduction control program recorded thereon and reproduction control program |
US7287011B1 (en) * | 1999-09-07 | 2007-10-23 | Keycorp Limited | Application management for multi application devices |
US7305357B2 (en) * | 2002-01-24 | 2007-12-04 | Shaw Cablesystems, G.P. | Method and system for providing and controlling delivery of content on-demand over a cable television network and a data network |
US7313547B2 (en) * | 2002-03-22 | 2007-12-25 | Sun Microsystems, Inc. | Manager level device/service arbitrator and methods |
US7353194B1 (en) * | 1999-03-02 | 2008-04-01 | Alticor Investments, Inc. | System and method for managing recurring orders in a computer network |
US7424747B2 (en) | 2001-04-24 | 2008-09-09 | Microsoft Corporation | Method and system for detecting pirated content |
US7793318B2 (en) | 2003-09-12 | 2010-09-07 | The Nielsen Company, LLC (US) | Digital video signature apparatus and methods for use with video program identification systems |
US20110238986A1 (en) * | 2010-03-24 | 2011-09-29 | Gm Global Technology Operations, Inc. | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
US8255938B2 (en) | 2003-06-20 | 2012-08-28 | The Nielsen Company (Us), Llc | Signature-based program identification apparatus and methods for use with digital broadcast systems |
US8635160B2 (en) | 2000-03-14 | 2014-01-21 | Sony Corporation | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030131350A1 (en) | 2002-01-08 | 2003-07-10 | Peiffer John C. | Method and apparatus for identifying a digital audio signal |
US20050259819A1 (en) * | 2002-06-24 | 2005-11-24 | Koninklijke Philips Electronics | Method for generating hashes from a compressed multimedia content |
MX2007002071A (en) * | 2004-08-18 | 2007-04-24 | Nielsen Media Res Inc | Methods and apparatus for generating signatures. |
JP4788213B2 (en) * | 2005-07-13 | 2011-10-05 | 富士ゼロックス株式会社 | Time stamp verification program and time stamp verification system |
JP4788212B2 (en) * | 2005-07-13 | 2011-10-05 | 富士ゼロックス株式会社 | Digital signature program and digital signature system |
US7725719B2 (en) | 2005-11-08 | 2010-05-25 | International Business Machines Corporation | Method and system for generating ciphertext and message authentication codes utilizing shared hardware |
JP2008022373A (en) * | 2006-07-13 | 2008-01-31 | Canon Inc | Alteration detection information generating apparatus, imaging apparatus, alteration detection information generating method, program, and storage medium |
JP2008022372A (en) * | 2006-07-13 | 2008-01-31 | Canon Inc | Alteration detection information generating apparatus, imaging apparatus, alteration detection information generating method, program, and storage medium |
JP4359622B2 (en) | 2007-01-22 | 2009-11-04 | 富士通株式会社 | Electronic signature program and electronic signature device |
JP2013138409A (en) * | 2011-11-30 | 2013-07-11 | Canon Inc | Information processing apparatus and method therefor |
JP6365076B2 (en) * | 2014-07-31 | 2018-08-01 | 大日本印刷株式会社 | Data converter |
JP6617375B2 (en) * | 2018-05-28 | 2019-12-11 | 大日本印刷株式会社 | Data converter |
CN115039374A (en) * | 2020-02-06 | 2022-09-09 | 三菱电机株式会社 | Encryption device, decryption device, encryption method, decryption method, encryption program, and decryption program |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0781003A2 (en) * | 1995-12-22 | 1997-06-25 | General Instrument Corporation Of Delaware | Generation of cryptographic signatures using hash keys |
EP0822720A1 (en) * | 1996-07-29 | 1998-02-04 | THOMSON multimedia | Conditional access system using messages with multiple encryption keys |
US5757919A (en) * | 1996-12-12 | 1998-05-26 | Intel Corporation | Cryptographically protected paging subsystem |
US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
WO1999007149A1 (en) * | 1997-08-01 | 1999-02-11 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5299197A (en) * | 1992-02-11 | 1994-03-29 | Roger Schlafly | Communications packet server protocol |
US5359659A (en) * | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5757913A (en) | 1993-04-23 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for data authentication in a data communication environment |
US5651069A (en) * | 1994-12-08 | 1997-07-22 | International Business Machines Corporation | Software-efficient message authentication |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US6157721A (en) * | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
JP3540511B2 (en) * | 1996-06-18 | 2004-07-07 | 株式会社東芝 | Electronic signature verification device |
US6023509A (en) * | 1996-09-30 | 2000-02-08 | Intel Corporation | Digital signature purpose encoding |
US5907619A (en) * | 1996-12-20 | 1999-05-25 | Intel Corporation | Secure compressed imaging |
US6009524A (en) * | 1997-08-29 | 1999-12-28 | Compact Computer Corp | Method for the secure remote flashing of a BIOS memory |
-
1999
- 1999-03-30 JP JP11088233A patent/JP2000286836A/en active Pending
- 1999-09-24 US US09/406,087 patent/US7512801B1/en not_active Expired - Fee Related
- 1999-09-28 EP EP99307624A patent/EP1041767B1/en not_active Expired - Lifetime
- 1999-09-28 DE DE69922157T patent/DE69922157T2/en not_active Expired - Lifetime
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
EP0781003A2 (en) * | 1995-12-22 | 1997-06-25 | General Instrument Corporation Of Delaware | Generation of cryptographic signatures using hash keys |
EP0822720A1 (en) * | 1996-07-29 | 1998-02-04 | THOMSON multimedia | Conditional access system using messages with multiple encryption keys |
US5757919A (en) * | 1996-12-12 | 1998-05-26 | Intel Corporation | Cryptographically protected paging subsystem |
WO1999007149A1 (en) * | 1997-08-01 | 1999-02-11 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
Cited By (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7231372B1 (en) * | 1998-09-22 | 2007-06-12 | Siemens Aktiengesellschaft | Method and system for paying for goods or services |
US7353194B1 (en) * | 1999-03-02 | 2008-04-01 | Alticor Investments, Inc. | System and method for managing recurring orders in a computer network |
US7287011B1 (en) * | 1999-09-07 | 2007-10-23 | Keycorp Limited | Application management for multi application devices |
US7240034B1 (en) * | 1999-10-26 | 2007-07-03 | France Telecom | Method for secure electronic transaction and corresponding system |
US7228293B2 (en) | 1999-11-29 | 2007-06-05 | Microsoft Corporation | Copy detection for digitally-formatted works |
US7177845B2 (en) | 1999-11-29 | 2007-02-13 | Microsoft Corporation | Copy detection for digitally-formatted works |
US7240033B2 (en) * | 2000-03-14 | 2007-07-03 | Sony Corporation | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system |
US8635160B2 (en) | 2000-03-14 | 2014-01-21 | Sony Corporation | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system |
WO2002025866A3 (en) * | 2000-09-18 | 2002-10-17 | At & T Corp | Apparatus, system and method for validating integrity of transmitted data |
WO2002025866A2 (en) * | 2000-09-18 | 2002-03-28 | At & T Corp. | Apparatus, system and method for validating integrity of transmitted data |
US7194440B2 (en) * | 2000-09-29 | 2007-03-20 | Deutsche Telekom Ag | Billing method using SSL/TLS |
US7424747B2 (en) | 2001-04-24 | 2008-09-09 | Microsoft Corporation | Method and system for detecting pirated content |
WO2002101971A3 (en) * | 2001-06-12 | 2003-11-27 | At & T Wireless Services Inc | Apparatus, system and method for validating integrity of transmitted data |
WO2002101971A2 (en) * | 2001-06-12 | 2002-12-19 | At & T Wireless Services, Inc. | Apparatus, system and method for validating integrity of transmitted data |
GB2381700B (en) * | 2001-11-01 | 2005-08-24 | Vodafone Plc | Telecommunication security arrangements and methods |
GB2381700A (en) * | 2001-11-01 | 2003-05-07 | Vodafone Plc | Verifying the authenticity and integrity of information transmitted over the air to a receiving station at the receiver using hash functions |
WO2003055135A3 (en) * | 2001-12-21 | 2003-11-27 | Koninkl Philips Electronics Nv | Synchronizing source and destination systems via parallel hash value determinations |
WO2003055135A2 (en) * | 2001-12-21 | 2003-07-03 | Koninklijke Philips Electronics N.V. | Synchronizing source and destination systems via parallel hash value determinations |
US7305357B2 (en) * | 2002-01-24 | 2007-12-04 | Shaw Cablesystems, G.P. | Method and system for providing and controlling delivery of content on-demand over a cable television network and a data network |
US7603322B2 (en) | 2002-02-25 | 2009-10-13 | Dexa Systems, Inc. | Method and apparatus for managing a key management system |
US7251635B2 (en) * | 2002-02-25 | 2007-07-31 | Schlumberger Omnes, Inc. | Method and apparatus for managing a key management system |
US7277871B2 (en) * | 2002-03-11 | 2007-10-02 | Matsushita Electric Industrial Co., Ltd. | Digital watermark system |
US7313547B2 (en) * | 2002-03-22 | 2007-12-25 | Sun Microsystems, Inc. | Manager level device/service arbitrator and methods |
US7280983B2 (en) * | 2002-09-02 | 2007-10-09 | Pioneer Corporation | Information recording medium having reproduction control program recorded thereon and reproduction control program |
EP1526700A3 (en) * | 2002-12-05 | 2014-03-19 | Microsoft Corporation | Secure recovery in a serverless distributed file system |
EP1526700A2 (en) * | 2002-12-05 | 2005-04-27 | Microsoft Corporation | Secure recovery in a serverless distributed file system |
US8255938B2 (en) | 2003-06-20 | 2012-08-28 | The Nielsen Company (Us), Llc | Signature-based program identification apparatus and methods for use with digital broadcast systems |
US7257557B2 (en) * | 2003-07-22 | 2007-08-14 | Online Testing Services, Inc. | Multi-modal testing methodology |
US8020180B2 (en) | 2003-09-12 | 2011-09-13 | The Nielsen Company (Us), Llc | Digital video signature apparatus and methods for use with video program identification systems |
US8683503B2 (en) | 2003-09-12 | 2014-03-25 | The Nielsen Company(Us), Llc | Digital video signature apparatus and methods for use with video program identification systems |
US9015742B2 (en) | 2003-09-12 | 2015-04-21 | The Nielsen Company (Us), Llc | Digital video signature apparatus and methods for use with video program identification systems |
US7793318B2 (en) | 2003-09-12 | 2010-09-07 | The Nielsen Company, LLC (US) | Digital video signature apparatus and methods for use with video program identification systems |
EP1594252A3 (en) * | 2004-05-04 | 2005-12-28 | Elsevier, Inc. | Systems and methods for data compression and decompression |
NL1028971C2 (en) * | 2004-05-04 | 2006-08-14 | Elsevier | Systems and methods for data compression and decompression. |
US8977859B2 (en) | 2004-05-04 | 2015-03-10 | Elsevier, Inc. | Systems and methods for data compression and decompression |
US9003194B2 (en) | 2004-05-04 | 2015-04-07 | Elsevier, Inc. | Systems and methods for data compression and decompression |
EP1594252A2 (en) * | 2004-05-04 | 2005-11-09 | Elsevier, Inc. | Systems and methods for data compression and decompression |
KR100950857B1 (en) | 2004-06-15 | 2010-03-31 | 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. | Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content |
WO2006001996A1 (en) * | 2004-06-15 | 2006-01-05 | Hewlett-Packard Development Company, L.P. | Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content |
EP1752906A2 (en) | 2005-07-25 | 2007-02-14 | Canon Kabushiki Kaisha | Information processing apparatus and method |
US20110238986A1 (en) * | 2010-03-24 | 2011-09-29 | Gm Global Technology Operations, Inc. | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
US8499155B2 (en) * | 2010-03-24 | 2013-07-30 | GM Global Technology Operations LLC | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
Also Published As
Publication number | Publication date |
---|---|
DE69922157D1 (en) | 2004-12-30 |
JP2000286836A (en) | 2000-10-13 |
EP1041767B1 (en) | 2004-11-24 |
US7512801B1 (en) | 2009-03-31 |
DE69922157T2 (en) | 2005-04-14 |
EP1041767A3 (en) | 2002-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1041767B1 (en) | Authentication of electronic data | |
US20240074004A1 (en) | Verification of interactions system and method | |
EP3693886B1 (en) | Optimizations for verification of interactions system and method | |
US11233657B2 (en) | Method and system for registering digital documents | |
CN111428207B (en) | Digital copyright registration and transaction method based on blockchain technology | |
US8256015B2 (en) | Method and apparatus for authentication of data streams with adaptively controlled losses | |
CN1909452A (en) | System and method for updating keys used for public key cryptography | |
US20060059357A1 (en) | Method and system for recovering the validity of cryptographically signed digital data | |
US20030131266A1 (en) | Generating and maintaining encrypted passwords | |
US8095792B2 (en) | One way authentication | |
CN107911354B (en) | Composite parallel data encryption method | |
US20040107346A1 (en) | Efficient authenticated dictionaries with skip lists and commutative hashing | |
CA2452419A1 (en) | Method for an integrated protection system of data distributed processing in computer networks and system for carrying out said method | |
CN118300672B (en) | Beidou satellite-based data transmission method and system | |
JP2000250408A (en) | File authentication system, system and method for signature, system and method for authentication, and recording medium | |
US9313021B2 (en) | Secret communication method with self-authentication capability | |
EP1145552B1 (en) | Video signal authentication system | |
CN111768180A (en) | Block chain account balance deposit certificate and recovery method | |
CN115499453A (en) | Sharding storage method facing alliance chain | |
CN116664123A (en) | Digital wallet design method based on blockchain technology | |
CN113282662B (en) | Block information processing method, device, equipment and medium | |
CN113806780A (en) | Block chain-based partially variable information storage method and device | |
CN117955653A (en) | ECU identity authentication method of CAN bus and storage medium | |
CN115988094A (en) | Digital signature processing method, system, electronic device and computer storage medium | |
CN117200992A (en) | System and method for identifying false of data stream transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
17P | Request for examination filed |
Effective date: 20020717 |
|
17Q | First examination report despatched |
Effective date: 20020911 |
|
AKX | Designation fees paid |
Designated state(s): DE FR GB |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 69922157 Country of ref document: DE Date of ref document: 20041230 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
ET | Fr: translation filed | ||
26N | No opposition filed |
Effective date: 20050825 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20150923 Year of fee payment: 17 Ref country code: DE Payment date: 20150922 Year of fee payment: 17 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20150811 Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 69922157 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20160928 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20170531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160928 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170401 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160930 |